Connectivity and security protocols

Connectivity and security are key requirements for IoT applications.

Trusted Objects has developed a set of secure connectivity stacks that facilitate the integration of the security in the IoT chain.

Covering several protocols, including LoRaWAN, SigFox, TLS, and DTLS, the connectivity stacks developed by Trusted Objects are either embedded into a secure hardware, or available as a separate IP. This architecture brings developers ease of integration and enhanced security.